SCF Advanced Search


Members
Stats
  • Total Posts: 32617
  • Total Topics: 9898
  • Online Today: 1284
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)











Author Topic: Security at the Core of Apple’s iOS 7  (Read 1900 times)

0 Members and 1 Guest are viewing this topic.

Pez

  • SCF VIP Member
  • *****
  • Posts: 774
  • KARMA: 117
  • Gender: Male
  • Pez
Security at the Core of Apple’s iOS 7
« on: 01. October 2013., 10:17:19 »
Security at the Core of Apple’s iOS 7

It’s been a fruitful season for Apple, with the announcement of new product and software, and a strong step into the mobile security front with the addition of fingerprint technology as part of their latest iPhone release. For the most part, both the iPhone 5s and iOS 7 have been touted as Apple’s most secure offerings to date. No doubt, these security updates will appeal to many of us who see the increasing importance of protecting the information we carry around on mobile devices. And as the battle between Apple and Android devices continues, these updates could be the key to who comes out ahead. If all goes well for Apple, the phone and OS updates could become standards for manufacturers looking to combine stellar user experience with secure functionality. Only time will tell over the next few weeks.


What exactly is it that has Apple users buzzing about the updates to both phone and software?


Let’s start with the new operating system (OS), iOS 7. The updated software represents not only a huge shift in design considerations for Apple but also a clear appreciation for the importance of security on consumer devices. The smaller market share for Apple products has kept it relatively off the radar for cybercrimals focusing their efforts on where the larger user base is. But this new offering shows that as threats increase in creativity and intricacy, the protections around our mobile devices need to be prepared for such attacks, no matter the maker.


Once you start using the new OS and its features, it’s easy to see that Apple has introduced some revolutionary security changes for those worried about the increasing presence of mobile phone malware. Here’s a quick glance at just some of the features in new iOS 7 to get excited about:

• Manage your passwords with iCloud Keychain. iCloud Keychain gives Apple users an excellent way to keep track of and access their keychain passwords through all their iOS and OS X devices (essentially from any Apple mobile device or personal computer). And eventually, with the launch of the new Mac OS Mavericks, all your keychain passwords will be available and encrypted on iCloud, Apple’s secure cloud service.

• Take control of your privacy, on the web and on your phone. Users are now able to more easily control third party applications with per-app controls for data usage, microphone access and camera access. Furthermore, iOS 7 introduces the “Do Not Track” addition to Safari, which ensures that complying websites will not be able to track users’ movements between websites.

• Block unwanted calls or texts. With the iOS 7 update, you will now also be able to block unwanted calls, messages, and FaceTime interactions from unwelcome contacts.

• Restrict the authority of other devices. Before, when you hooked your device up to a computer with your USB cable, the computer immediately had access to your device as a USB storage device. Now, your device will treat the computer as a charger unless you sign in with your Apple ID and password before allowing the computer to access the data on your iPhone or iPad.


Although most of the features above are readily available to users on any iPhone 4 and newer who download the new OS, the biggest security feature, Touch ID—Apple’s fingerprint identity solution─is only available on the iPhone 5s. Many tech companies have been working to integrate biometrics into their security features, and Apple appears to have done so quite smoothly with the incorporation of fingerprint scanning technology into their latest product release. Apple’s fingerprint scanner is integrated within the home button, making the transition seamless for more seasoned iPhone users. Previously, many were not using the lock screen feature, but Touch ID may inspire some users to try their thumb at securing their devices. The feature has seen a few setbacks and reported hacks in the first few days since the release, but people are still flooding in lines outside Apple stores to get their hands on the new phone.


And for those with concerns that your print will be sent to some secret NSA database for storage and cataloging, Apple has made it clear that fingerprint information will only be stored on the scanner’s chip, not through iCloud or any third-party application (keeping the scan strictly on your device). Finally, the Touch ID is an optional feature. You can still enjoy the new iPhone 5s without it activated, should you be on the fence about using the fingerprint security scan.


With all of these new features in mind, Apple could definitely be leading the way for strong everyday protection of mobile devices and applications. Should the rest of the mobile device market follow Apple’s lead with just some of these features, we could see increased protection of mobile data and hopefully a drop in the number of people adversely affected by malicious cyber activity. However, even with these new securities installed, there are still some actions you can take to help you keep your mobile data protected across any OS or mobile phone model:

• Keep your device on lockdown. be it with a 4-digit PIN code or fingerprint, keep your mobile device locked up when not in use.

• Regularly change and update passwords as a precaution against cyber snoops. Be sure not to use the same password across multiple accounts, i.e. financial, social media, and email logins.

• Check the before you click on a link. Don’t click on links or attachments in emails or messages from senders you do not know, they could lead to malware or other unwanted downloads.

• Be cautious of messages that ask for personal information. Be it in an email, text message, social media message or a chat, most businesses will not request information they have no need for such as an email password. If requests seem suspicious, play it safe and don’t give out your valuable information.

• Guard your third-party app access. Be wary of mobile apps that ask for more permission than they should need to perform their actions. Game apps should not need access to location information or email passwords.

• Be choosy where you download. Stick to trusted stores when downloading apps, as third-party app stores and websites can be teaming with risky apps and malware-laden programs. Trusted vendors such as Apple App Store and Google Play have protections in place to help ensure the apps you download to your mobile device do what they say.

• Stay off public Wi-Fi when accessing apps that hold sensitive data. Do not access apps that require sensitive logins, i.e. banking apps, over a public Wi-Fi signal, say at the local coffee shop, or you could be giving up your most trusted information to cyber snoops sitting right next to you.

• Keep your apps up-to-date. Make sure to install the latest updates on each of your apps, many address known bugs and apply patches to security holes.


Change can be difficult, but it can also lead to new and exciting improvements. For more on the latest mobile OS security threats and updates, don’t forget to follow our team on Facebook and on Twitter at @McAfeeConsumer.



Original article: By Gary Davis on Sep 30, 2013
Their is two easy way to configure a system!
Every thing open and every thing closed.
Every thing else is more or less complex.

Start Turfing ! http://scforum.info/index.php/topic,8405.msg21475.html#msg21475

Samker's Computer Forum - SCforum.info

Security at the Core of Apple’s iOS 7
« on: 01. October 2013., 10:17:19 »
Sponsored Links:




 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising